Thursday, September 10, 2009

Security textbooks

Books 2 Byte
Mark Stamp’s Information Security
Deven N. Shah

Restricting access

If your application is on the enterprise’s Intranet, configure it to use Windows integrated security, advises Deven N. Shah in Mark Stamp’s Information Security: Principles and practice. That way, he says, the user’s logon credentials can be used for accessing resources.


No comments: